Author of the publication

Fundamentals of Network Forensics - A Research Perspective

, and . Computer Communications and Networks Springer, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Framework for Network Forensic Analysis., , and . ICT, volume 101 of Communications in Computer and Information Science, page 142-147. Springer, (2010)Task Clustering-Based Energy-Aware Workflow Scheduling in Cloud Environment., , , , and . HPCC/SmartCity/DSS, page 968-973. IEEE, (2018)CHACT: Convex Hull Enabled Active Contour Technique for Salient Object Detection., , and . IEEE Access, (2018)Energy-efficient fuzzy-based approach for dynamic virtual machine consolidation., , , , and . Int. J. Grid Util. Comput., 10 (4): 308-325 (2019)VMGuard: A VMI-Based Security Architecture for Intrusion Detection in Cloud Environment., , , and . IEEE Trans. Cloud Comput., 8 (3): 957-971 (2020)BGSA: Broker Guided Service Allocation in Federated Cloud., , and . Sustain. Comput. Informatics Syst., (2021)A smart anomaly-based intrusion detection system for the Internet of Things (IoT) network using GWO-PSO-RF model., , , and . J. Reliab. Intell. Environ., 7 (1): 3-21 (2021)VAED: VMI-assisted evasion detection approach for infrastructure as a service cloud., , , and . Concurr. Comput. Pract. Exp., (2017)Survey of Peer-to-Peer Botnets and Detection Frameworks., , and . Int. J. Netw. Secur., 20 (3): 547-557 (2018)A Taxonomy of Hypervisor Forensic Tools., , and . IFIP Int. Conf. Digital Forensics, volume 589 of IFIP Advances in Information and Communication Technology, page 181-199. Springer, (2020)